Traps management service provides default security profiles that you can use out of the box to immediately begin protecting your endpoints from threats. While security rules enable you to block or allow files to run on your endpoints, security profiles help you customize and reuse settings across different groups of endpoints. When Traps detects behavior that matches a rule defined in your security policy, Traps applies the security profile that is attached to the rule for further inspection.
Exploit profiles block attempts to exploit system flaws in browsers, and in the operating system. For example, Exploit profiles help protect against exploit kits, illegal code execution, and other attempts to exploit process and system vulnerabilities. Exploit profiles are supported for Windows, Mac, and Linux platforms.
To customize an Exploit Profile, see Add a New Exploit Security Profile.
Malware profiles protect against the execution of malware including trojans, viruses, worms, and grayware. Malware profiles serve two main purposes: to define how to treat behavior common with malware, such as ransomware or script-based attacks, and to define how to treat known malware and unknown files. Malware profiles are supported for all platforms.
To customize a Malware Profile, see Add a New Malware Security Profile.
Restrictions profiles limit where executables can run on an endpoint. For example, you can restrict files from running from specific local folders or from removable media. Restrictions profiles are supported only for Windows platforms.
To customize a Restrictions Profile, see Add a New Restrictions Security Profile.
Agent Settings Profiles
Agent Settings profiles enable you to customize settings that apply to the Traps app (such as the disk space quota for log retention). For Mac and Windows platforms, you can also customize user interface options for the Traps console, such as accessibility and notifications.
To customize an Agent Settings profile, see Add a New Agent Settings Profile.
Protection Capabilities Each security profile provides a tailored list of protection capabilities that you can configure for the platform you select. The following table describes ...
Add a New Exploit Security Profile
Add a New Exploit Security Profile Exploit security profiles allow you to configure the action Traps takes when attempts to exploit software vulnerabilities or flaws ...
Add a New Restrictions Security Profile
Add a New Restrictions Security Profile Restrictions security profiles limit the surface of an attack on a Windows endpoint by defining where and how your ...
Add a New Malware Security Profile
Add a New Malware Security Profile Malware security profiles allow you to configure the action Traps takes when known malware and unknown files try to ...
Traps Evaluation and Protection Flow
Traps Evaluation and Protection Flow Traps utilizes advanced multi-method protection and prevention techniques to protect your endpoints from both known and unknown malware and software ...
Features Introduced in 2018
Introducing new features in the Traps management service by month during 2018. ...
Traps™ Endpoint Security Manager 4.1 Release Notes
Traps™ Endpoint Security Manager 4.1 Release Notes ...